detección de vulnerabilidades con la herramienta fuzzing enmarcada en el proyecto Bieco

Detection: the key against vulnerabilities

  Are the programmes we run secure? Will the software that is in the process of development be secure? The only certainty we have is that all software can contain weaknesses or vulnerabilities.  These cracks can allow a person with unwanted intentions to gain access to the program. He or she could, for example, malfunction […]

Imagen que simboliza el 5G y el uso de la inteligencia artificial

Artificial intelligence, key to identifying 5G signals

We live in a hyper-connected world. Our smartphones, home automation systems or IoT devices used by some utilities are connected to highly complex communications networks that need to be monitored from a radioelectric point of view. In this monitoring of radiofrequency signals there is an essential function to prevent incidents such as interference or a […]

10 key factors to the Smart Industry

We are immersed in an environment in which we continually hear about Industry 4.0 and the application of technologies such as IoT or Artificial Intelligence to solve multiple problems and use cases that may arise in a manufacturing environment. Typical examples may be defect reduction and prescription of industrial process parameters, logistics optimization, or even […]

Attack Detection in Industrial Networks

The current industrial modernization requires a deployment of communication networks that allow the operation and monitorization of diverse processes, such as water distribution or electricity generation. This cluster of neworks belongs to what is commonly known as Operation Technology (OT), which is sensible to suffer from different kinds of cyberattacks that may cause security breaches, […]